Name | CVE-2014-3529 |
Description | The OPC SAX setup in Apache POI before 3.10.1 allows remote attackers to read arbitrary files via an OpenXML file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
libapache-poi-java (PTS) | jessie | 3.10.1-2 | fixed |
| stretch | 3.10.1-3 | fixed |
| buster, bullseye | 4.0.1-1 | fixed |
| bookworm | 4.0.1-4 | fixed |
| sid, trixie | 4.0.1-6 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
libapache-poi-java | source | (unstable) | 3.10.1-1 | | | |
Notes
[wheezy] - libapache-poi-java <no-dsa> (Minor issue)
https://issues.apache.org/bugzilla/show_bug.cgi?id=56164